Subcategories
Please register here if you want to download anything!

If domain in your address bar is different from the list below
PLEASE LEAVE THAT SITE IMMEDIATELY
❗IT'S A DANGEROUS FAKE❗



Spicy Magazines for Men! ;-)

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

Posted By: hill0
CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition

CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition
by Matt Walker

English | 2019 | ISBN: 126045455X | 576 Pages | EPUB | 10.64 MB

Penetration Testing with KALI and More: All You Need to Know

Posted By: Sigha
Penetration Testing with KALI and More: All You Need to Know

Penetration Testing with KALI and More: All You Need to Know
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 4.18 GB
Duration: 6.5 hours | Genre: eLearning | Language: English

Ethical Hacking with KALI LINUX

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Posted By: First1
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World by Marcus J. Carey, Jennifer Jin
English | August 3rd, 2019 | ISBN: 1119643376 | 400 pages | EPUB | 4.74 MB

Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe.

Secure Messaging on the Internet

Posted By: readerXXI
Secure Messaging on the Internet

Secure Messaging on the Internet
by Rolf Oppliger
English | 2014 | ISBN: 1608077179 | 282 Pages | PDF | 2.92 MB

Understanding Cyber Warfare : Politics, Policy and Strategy

Posted By: readerXXI
Understanding Cyber Warfare : Politics, Policy and Strategy

Understanding Cyber Warfare : Politics, Policy and Strategy
by Christopher Whyte and Brian Mazanec
English | 2019 | ISBN: 113864062X | 307 Pages | PDF | 2.97 MB

Ethical password hacking and protecting (Updated)

Posted By: Sigha
Ethical password hacking and protecting (Updated)

Ethical password hacking and protecting (Updated)
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.29 GB
Duration: 5 hours | Genre: eLearning | Language: English

This Video tutorial helps you to learn different password hacks and protecting methods

Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 (Repost)

Posted By: AvaxGenius
Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 (Repost)

Computing, Communication and Signal Processing: Proceedings of ICCASP 2018 by Brijesh Iyer
English | PDF | 2018 (2019 Edition) | 1004 Pages | ISBN : 9811315124 | 40.08 MB

This book highlights cutting-edge research on various aspects of human–computer interaction (HCI). It includes selected research papers presented at the Third International Conference on Computing, Communication and Signal Processing (ICCASP 2018), organized by Dr. Babasaheb Ambedkar Technological University in Lonere-Raigad, India on January 26–27, 2018. It covers pioneering topics in the field of computer, electrical, and electronics engineering, e.g. signal and image processing, RF and microwave engineering, and emerging technologies such as IoT, cloud computing, HCI, and green computing. As such, the book offers a valuable guide for all scientists, engineers and research students in the areas of engineering and technology.

Hands-On Artificial Intelligence for Cybersecurity

Posted By: Grev27
Hands-On Artificial Intelligence for Cybersecurity

Hands-On Artificial Intelligence for Cybersecurity: Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies by Alessandro Parisi
English | ISBN: 1789804027 | 342 pages | EPUB | August 2, 2019 | 8.32 Mb

Hacking: The Practical Guide to Become a Hacker

Posted By: hill0
Hacking: The Practical Guide to Become a Hacker

Hacking: The Practical Guide to Become a Hacker | Field Manual for Ethical Hacker | Including Ethical Hacking with Kali Linux
by Jim Kou

English | 2019 | ISBN: 1080762205 | 184 Pages | EPUB | 9.21 MB

Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Posted By: AvaxGenius
Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Machine Learning in Cyber Trust: Security, Privacy, and Reliability by Philip S. Yu
English | PDF | 2009 | 367 Pages | ISBN : 0387887342 | 9.79 MB

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

Ethical Hacking: The Complete Malware Analysis Process

Posted By: IrGens
Ethical Hacking: The Complete Malware Analysis Process

Ethical Hacking: The Complete Malware Analysis Process
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 32m | 185 MB
Instructor: Malcolm Shore

Cybercryptography: Applicable Cryptography for Cyberspace Security (Repost)

Posted By: AvaxGenius
Cybercryptography: Applicable Cryptography for Cyberspace Security (Repost)

Cybercryptography: Applicable Cryptography for Cyberspace Security by Song Y. Yan
English | PDF,EPUB | 2019 | 443 Pages | ISBN : 3319725343 | 48.84 MB

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.

Hands-On Ethical Hacking and Network Defense (2nd Edition)

Posted By: Jeembo
Hands-On Ethical Hacking and Network Defense (2nd Edition)

Hands-On Ethical Hacking and Network Defense (2nd Edition) by Michael T. Simpson, Kent Backman, James Corley
English | 2010 | ISBN: 1435486099 | 480 Pages | PDF | 28.4 MB

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks.

Ethical Hacking and Countermeasures: Attack Phases

Posted By: Jeembo
Ethical Hacking and Countermeasures: Attack Phases

Ethical Hacking and Countermeasures: Attack Phases by EC-Council
English | 2009 | ISBN: 143548360X | 352 Pages | PDF | 17.5 MB

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures.

Ethical Hacking - Capture the Flag Walkthroughs - v2

Posted By: Sigha
Ethical Hacking - Capture the Flag Walkthroughs - v2

Ethical Hacking - Capture the Flag Walkthroughs - v2
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.35 GB
Duration: 2 hours | Genre: eLearning | Language: English

Video and lab Walkthroughs for capture the Flag exercises that with strengthen your ethical hacking skills.